<div dir="ltr"><p class="MsoNormal" style="margin:0cm 0cm 8pt;line-height:107%;font-size:11pt;font-family:Calibri,sans-serif"></p>
<p class="MsoNormal" style="margin:0cm 0cm 8pt;line-height:107%;font-size:11pt;font-family:Calibri,sans-serif">[We apology for possible cross posting, and thank you in advance
for distributing this CFP ]</p>
<p class="MsoNormal" style="margin:0cm 0cm 8pt;line-height:107%;font-size:11pt;font-family:Calibri,sans-serif">Communication and Information Systems
Security Symposium, IEEE ICC 2020</p>
<p class="MsoNormal" style="margin:0cm 0cm 8pt;line-height:107%;font-size:11pt;font-family:Calibri,sans-serif"><a href="https://icc2020.ieee-icc.org/call-symposium-papers" style="color:blue"><span style="color:windowtext">https://icc2020.ieee-icc.org/call-symposium-papers</span></a> </p>
<p class="MsoNormal" style="margin:6pt 0cm 8pt;line-height:107%;font-size:11pt;font-family:Calibri,sans-serif">Submission: <a href="https://www.edas.info/N26447" style="color:blue"><span style="color:windowtext">https://www.edas.info/N26447</span></a></p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><b>Scope and
Topics of Interest</b></p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><b> </b></p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">As communication and information systems are becoming more
indispensable to the society today, security and privacy have also become more
critical and challenging when many contents, devices and users get connected to
the Internet. This trend will inevitably continue in the future.</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"> </p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">This symposium welcomes manuscripts on all aspects of the modelling,
design, implementation, deployment, and management of security and privacy algorithms,
protocols, architectures, and systems. Furthermore, contributions devoted to
the evaluation, optimization, or enhancement of security and privacy mechanisms
for current technologies, as well as devising efficient security and privacy
solutions for emerging areas from physical layer technology to the application
layer, are solicited. </p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"> </p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">Topics of interest include, but are
not limited to, the following:</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"> </p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Anonymous communication, metrics and
performance</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Attack, detection and prevention</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Artificial intelligence for security
and privacy</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Authentication protocols and key
management</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Autonomous vehicle security</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Availability and survivability of
secure services and systems</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Biometric security: technologies,
risks, vulnerabilities, bio-cryptography</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Blockchain security and privacy</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Cloud, data center and distributed
systems security</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Computer and network forensics</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Cryptography for network security</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Digital rights management</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Fog computing security and privacy</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Formal trust models, security
modelling, and design of secure protocols</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Generative adversarial networks</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Internet of Things security and
privacy</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Malware detection and damage
recovery</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Machine learning for security and
privacy</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Network security metrics and
performance</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Operating systems and application
security</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Physical security and
hardware/software security</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Security in healthcare systems</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Security in smart grid
communications</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Security in vehicular communications</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Security in virtual machine
environments</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Security tools for communication and
information systems</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">o Trustworthy computing</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"> </p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><b>Submission
Guidelines</b></p>
<p class="MsoNormal" style="margin:6pt 0cm 8pt;line-height:107%;font-size:11pt;font-family:Calibri,sans-serif">The IEEE ICC 2020 website
(<a href="http://icc2020.ieee-icc.org">icc2020.ieee-icc.org</a>) provides full instructions on manuscript format and how
to submit a manuscript. For this security symposium, please use the submission
url below. <a href="https://www.edas.info/N26447" style="color:blue"><span style="color:windowtext">https://www.edas.info/N26447</span></a></p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><b>Important
Dates</b></p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">Paper
Submission Deadline: 14 October
2019</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">Notification
of Acceptance: 27 January 2020</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">Camera Ready
Submissions: 24 February 2020</p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><b> </b></p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><b>Symposium
Chairs</b></p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">Shui
Yu, University of Technology Sydney, Australia,
<a href="mailto:Shui.Yu@uts.edu.au">Shui.Yu@uts.edu.au</a></p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">Bin
Xiao, Hong Kong Polytechnic, China, <span style="font-size:12pt"><a href="mailto:csbxiao@comp.polyu.edu.hk">csbxiao@comp.polyu.edu.hk</a></span></p>
<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif">Jennifer
Chen, Rutgers University, USA, <span style="font-size:12pt"><a href="mailto:yingche@scarletmail.rutgers.edu">yingche@scarletmail.rutgers.edu</a></span></p>
<p class="MsoNormal" style="margin:0cm 0cm 8pt;line-height:107%;font-size:11pt;font-family:Calibri,sans-serif"> <span style="font-family:Arial,Helvetica,sans-serif;font-size:small"> </span></p><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><p style="margin:0cm 0cm 0pt"><span><span><font size="3" face="Calibri"></font></span></span></p>
<p style="margin:0cm 0cm 0pt"><span><span><font size="3"><font face="Calibri"></font></font></span></span></p>
<p style="margin:0cm 0cm 0pt"><span><span><font size="3"><font face="Calibri">-----------------------------</font></font></span></span></p>
<p style="margin:0cm 0cm 0pt"><span><span><font size="3"><font face="Calibri">Shui YU, PhD, Professor</font></font></span></span></p>
<p style="margin:0cm 0cm 0pt"><span><span><font size="3"><font face="Calibri">School of Software, University of Technology Sydney, </font></font></span></span></p>
<p style="margin:0cm 0cm 0pt"><span><span><font size="3"><font face="Calibri">Sydney,<span> </span>Australia.</font></font></span></span></p>
<p style="margin:0cm 0cm 0pt"><a href="http://www.deakin.edu.au/~syu" style="font-family:Calibri;font-size:medium" target="_blank">http://www.nsp.org.au/syu</a>/ <br></p></div></div></div></div></div></div>